CVE-2024-45509: n/a
CVE-2024-45509 is a critical vulnerability in MISP (Malware Information Sharing Platform) versions up to 2. 4. 196, where the BookmarksController. php file does not properly restrict access to bookmarks data for users who are not organization administrators. This flaw allows unauthenticated remote attackers to access, modify, and delete sensitive bookmark data without any privileges or user interaction. The vulnerability has a CVSS score of 9. 8, indicating a critical severity with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations relying on MISP for threat intelligence sharing are at significant risk of data exposure and manipulation. Immediate patching or application of access control workarounds is recommended to prevent exploitation.
AI Analysis
Technical Summary
CVE-2024-45509 is a critical access control vulnerability identified in the Malware Information Sharing Platform (MISP) up to version 2.4.196. The vulnerability resides in the app/Controller/BookmarksController.php component, which fails to enforce proper authorization checks for bookmark data access. Specifically, users who are not organization administrators can bypass access restrictions and gain unauthorized access to bookmarks data. This flaw violates the principle of least privilege, allowing attackers to read, modify, or delete bookmarks that may contain sensitive threat intelligence information. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, making it a critical security issue. Although no public exploits have been reported yet, the high severity score (9.8) and the nature of the vulnerability make it a prime target for attackers aiming to compromise threat intelligence data or disrupt sharing operations. The underlying weakness corresponds to CWE-284 (Improper Access Control), highlighting a failure in enforcing correct permissions. Organizations using MISP should prioritize remediation once patches are available or implement strict network-level access controls to mitigate risk.
Potential Impact
The vulnerability allows unauthorized remote attackers to access, modify, and delete bookmarks data within MISP without any authentication or privileges. This can lead to significant confidentiality breaches, exposing sensitive threat intelligence that could be used by adversaries to evade detection or plan attacks. Integrity is compromised as attackers can alter or delete critical data, undermining trust in the platform and potentially causing misinformation or loss of valuable intelligence. Availability is also at risk since attackers could delete bookmarks, disrupting normal operations and collaboration within security teams. Given MISP's role in sharing cyber threat information among organizations and governments, exploitation could have cascading effects on incident response and threat mitigation efforts globally. The ease of exploitation and lack of required user interaction increase the likelihood of attacks, potentially affecting a broad range of users and organizations relying on MISP for cybersecurity intelligence.
Mitigation Recommendations
1. Apply patches or updates from MISP developers as soon as they become available to fix the access control flaw in BookmarksController.php. 2. Until patches are released, restrict network access to MISP instances by limiting connections to trusted IP addresses and using VPNs or secure tunnels. 3. Implement strict role-based access controls and audit user permissions regularly to ensure only authorized personnel have administrative privileges. 4. Monitor MISP logs for unusual access patterns or unauthorized attempts to access bookmark data. 5. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the bookmarks functionality. 6. Educate users and administrators about the vulnerability and encourage prompt reporting of anomalies. 7. Regularly back up MISP data, including bookmarks, to enable recovery in case of data tampering or deletion. 8. Conduct security assessments and penetration testing focused on access control mechanisms within MISP to identify and remediate similar issues proactively.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, Netherlands, Sweden, Finland
CVE-2024-45509: n/a
Description
CVE-2024-45509 is a critical vulnerability in MISP (Malware Information Sharing Platform) versions up to 2. 4. 196, where the BookmarksController. php file does not properly restrict access to bookmarks data for users who are not organization administrators. This flaw allows unauthenticated remote attackers to access, modify, and delete sensitive bookmark data without any privileges or user interaction. The vulnerability has a CVSS score of 9. 8, indicating a critical severity with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations relying on MISP for threat intelligence sharing are at significant risk of data exposure and manipulation. Immediate patching or application of access control workarounds is recommended to prevent exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2024-45509 is a critical access control vulnerability identified in the Malware Information Sharing Platform (MISP) up to version 2.4.196. The vulnerability resides in the app/Controller/BookmarksController.php component, which fails to enforce proper authorization checks for bookmark data access. Specifically, users who are not organization administrators can bypass access restrictions and gain unauthorized access to bookmarks data. This flaw violates the principle of least privilege, allowing attackers to read, modify, or delete bookmarks that may contain sensitive threat intelligence information. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, making it a critical security issue. Although no public exploits have been reported yet, the high severity score (9.8) and the nature of the vulnerability make it a prime target for attackers aiming to compromise threat intelligence data or disrupt sharing operations. The underlying weakness corresponds to CWE-284 (Improper Access Control), highlighting a failure in enforcing correct permissions. Organizations using MISP should prioritize remediation once patches are available or implement strict network-level access controls to mitigate risk.
Potential Impact
The vulnerability allows unauthorized remote attackers to access, modify, and delete bookmarks data within MISP without any authentication or privileges. This can lead to significant confidentiality breaches, exposing sensitive threat intelligence that could be used by adversaries to evade detection or plan attacks. Integrity is compromised as attackers can alter or delete critical data, undermining trust in the platform and potentially causing misinformation or loss of valuable intelligence. Availability is also at risk since attackers could delete bookmarks, disrupting normal operations and collaboration within security teams. Given MISP's role in sharing cyber threat information among organizations and governments, exploitation could have cascading effects on incident response and threat mitigation efforts globally. The ease of exploitation and lack of required user interaction increase the likelihood of attacks, potentially affecting a broad range of users and organizations relying on MISP for cybersecurity intelligence.
Mitigation Recommendations
1. Apply patches or updates from MISP developers as soon as they become available to fix the access control flaw in BookmarksController.php. 2. Until patches are released, restrict network access to MISP instances by limiting connections to trusted IP addresses and using VPNs or secure tunnels. 3. Implement strict role-based access controls and audit user permissions regularly to ensure only authorized personnel have administrative privileges. 4. Monitor MISP logs for unusual access patterns or unauthorized attempts to access bookmark data. 5. Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the bookmarks functionality. 6. Educate users and administrators about the vulnerability and encourage prompt reporting of anomalies. 7. Regularly back up MISP data, including bookmarks, to enable recovery in case of data tampering or deletion. 8. Conduct security assessments and penetration testing focused on access control mechanisms within MISP to identify and remediate similar issues proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-01T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6cedb7ef31ef0b56a445
Added to database: 2/25/2026, 9:43:09 PM
Last enriched: 2/26/2026, 8:14:47 AM
Last updated: 2/26/2026, 9:33:37 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.